Logo

    m365 podcast

    Explore "m365 podcast" with insightful episodes like "EP24: The Danger of Malicious OAuth Apps in M365", "EP22: Can You Trust Microsoft with Security?" and "EP20: What's Going on With Azure AD?" from podcasts like ""The Security Swarm: A Hornetsecurity Podcast", "The Security Swarm: A Hornetsecurity Podcast" and "The Security Swarm: A Hornetsecurity Podcast"" and more!

    Episodes (3)

    EP24: The Danger of Malicious OAuth Apps in M365

    EP24: The Danger of Malicious OAuth Apps in M365

    Malicious OAuth apps are an issue that has plagued M365 for many years. By default, end users are given great freedom to “authorize” OAuth apps and provide them access to the M365 tenant, unknowingly creating a security issue that persists even once the affected user’s password has changed! 

    In today’s episode, Andy and Paul Schnakenburg discuss the danger of malicious OAuth apps at length, providing listeners info on the danger, what you can do about it, and what you need to look out for! Hope you enjoy! 

    Timestamps:

    (1:57) – What are malicious OAuth Applications? 

    (5:21) – Who can authorize OAuth Applications in a M365 tenant? 

    (8:25) – How are malicious OAuth Applications getting past Microsoft Review? 

    (14:56) – An example of a how a malicious OAuth Application might function in an attack 

    (17:44) – Mitigation and prevention of malicious OAuth Application attacks 

    EP22: Can You Trust Microsoft with Security?

    EP22: Can You Trust Microsoft with Security?

    In this week’s episode, Andy and Paul have a discussion that has been brewing for the past several episodes. Microsoft has experienced a series of security incidents in the last few years. For example, the SolarWinds debacle in 2020, multiple exchange server on-prem issues, and more recently the Storm-0558 incident. 

    The core issue that all these problems raise, especially for a major global cloud provider, is trust. Can Microsoft be trusted to secure these services that millions around the globe use every single day? This is the main question that the guys get into in this episode along with lots of other great discussions around security in the Microsoft Cloud.  

    Timestamps:

    (1:55) – There has been a recent string of security issues at Microsoft 

    (6:42) – Storm-0558 

    (16:38) – Follow up on the SolarWinds attack from 2020 

    (20:50) – Multiple Exchange on-prem vulnerabilities over the last several years 

    (22:55) Power Platform cross-tenant un-authorized access 

    (26:61) – Communication seems to be a sore spot across all these issues 

    EP20: What's Going on With Azure AD?

    EP20: What's Going on With Azure AD?

    Paul Schnackenburg joins Andy in this episode to discuss the recent rebranding of Azure AD to Microsoft Entra ID, as well as talk about some new identity features in the Microsoft Cloud. To kick things off, they provide a brief overview of what Azure AD is/was and its crucial role in the Microsoft Cloud ecosystem.  

    Amidst the changes, Andy and Paul emphasize a critical point: IT professionals and security experts primarily care about understanding a platform's functionality, features, and ability to solve real-world problems. The name may change, but the core value remains the same.

    Timestamps:

    2:03 Azure AD is Now Microsoft Entra 

    9:35 Relevant Acronyms for the Identity Space 

    13:49 – Entra Internet Access 

    21:28 – Entra Private Access 

    26:44 M365 / Entra ID Tenant Restrictions 

    30:23 How Do These Features Factor Into the Storm-0558 Breach? 

    Episode resources:

    Hornetsecurity 365 Total Protection

    Podcast episode: Licensing Security Features in M365

    Microsoft Entra

    Azure Active Directory Domain Services

    Find Andy on LinkedInTwitter or Mastadon

    Find Paul on LinkedIn or Twitter

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io